Update URLs to https (#366)

* Update URLs to https

* Fix https://pypi.python.org/pypi/oic/ link
This commit is contained in:
Stian Thorgersen 2018-04-20 10:25:03 +02:00 committed by GitHub
parent 5ed85df376
commit f840a3484a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 10 additions and 10 deletions

View file

@ -1,7 +1,7 @@
=== Installing Distribution Files
The {project_name} Server is contained in one http://www.keycloak.org/downloads.html[distribution file]:
The {project_name} Server is contained in one https://www.keycloak.org/downloads.html[distribution file]:
* 'keycloak-{project_version}.[zip|tar.gz]'

View file

@ -7,5 +7,5 @@ and server configuration and does not cover any complex deployment options. If y
in-depth discussion of any features or configuration options, consult the various reference guides available.
ifeval::[{project_product}==true]
{project_name} is based on the open source link:https://www.keycloak.org/[Keycloak] community project, which has its documentation link:http://www.keycloak.org/documentation.html[here].
{project_name} is based on the open source link:https://www.keycloak.org/[Keycloak] community project, which has its documentation link:https://www.keycloak.org/documentation.html[here].
endif::[]

View file

@ -5,7 +5,7 @@ Download the {appserver_name} distribution and unzip
it into a directory on your machine.
ifeval::[{project_community}==true]
Next download the WildFly OpenID Connect adapter distribution from link:http://www.keycloak.org/downloads.html[keycloak.org].
Next download the WildFly OpenID Connect adapter distribution from link:https://www.keycloak.org/downloads.html[keycloak.org].
endif::[]
ifeval::[{project_product}==true]

View file

@ -32,7 +32,7 @@ ifeval::[{project_community}==true]
* https://github.com/dylanplecki/KeycloakOwinAuthentication[OWIN] (community)
==== Python
* https://pypi.python.org/pypi/oic/[oidc] (generic)
* https://pypi.org/project/oic/[oidc] (generic)
==== Android
* https://github.com/openid/AppAuth-Android[AppAuth] (generic)

View file

@ -718,7 +718,7 @@ For the environments with slower network between data centers and probability of
* It is recommended to keep the `sessions` and `clientSessions` caches in `SYNC`. Switching them to `ASYNC` is possible only if you are sure that user requests and backchannel requests (requests from client applications to {project_name} as described in <<requestprocessing>>) will be always processed on same site. This is true, for example, if:
** You use active/passive mode as described <<modes>>.
** All your client applications are using the {project_name} link:http://www.keycloak.org/docs/latest/securing_apps/index.html#_javascript_adapter[JavaScript Adapter]. The JavaScript adapter sends the backchannel requests within the browser and hence they participate on the browser sticky session and will end on same cluster node (hence on same site) as the other browser requests of this user.
** All your client applications are using the {project_name} link:https://www.keycloak.org/docs/latest/securing_apps/index.html#_javascript_adapter[JavaScript Adapter]. The JavaScript adapter sends the backchannel requests within the browser and hence they participate on the browser sticky session and will end on same cluster node (hence on same site) as the other browser requests of this user.
** Your load balancer is able to serve the requests based on client IP address (location) and the client applications are deployed on both sites.
+
For example you have 2 sites LON and NYC. As long as your applications are deployed in both LON and NYC sites too, you can ensure that all the user requests from London users will be redirected to the applications in LON site and also to the {project_name} servers in LON site. Backchannel requests from the LON site client deployments will end on {project_name} servers in LON site too. On the other hand, for the American users, all the {project_name} requests, application requests and backchannel requests will be processed on NYC site.

View file

@ -6,7 +6,7 @@
:project_versionNpm: 4.0.0-beta.1
:project_versionDoc: 4.0
:project_images: keycloak-images
:project_doc_base_url: http://www.keycloak.org/docs/{project_versionDoc}
:project_doc_base_url: https://www.keycloak.org/docs/{project_versionDoc}
:project_dirref: KEYCLOAK_HOME
:quickstartRepo_link: https://github.com/keycloak/keycloak-quickstarts
@ -51,9 +51,9 @@
:installguide_troubleshooting_link: {installguide_link}#troubleshooting
:apidocs_javadocs_name: JavaDocs Documentation
:apidocs_javadocs_link: http://www.keycloak.org/docs-api/{project_versionDoc}/javadocs/
:apidocs_javadocs_link: https://www.keycloak.org/docs-api/{project_versionDoc}/javadocs/
:apidocs_adminrest_name: Administration REST API
:apidocs_adminrest_link: http://www.keycloak.org/docs-api/{project_versionDoc}/rest-api/
:apidocs_adminrest_link: https://www.keycloak.org/docs-api/{project_versionDoc}/rest-api/
:appserver_name: WildFly
:appserver_dirref: WILDFLY_HOME
@ -84,4 +84,4 @@
:fuseHawtioWARVersion: hawtio-wildfly-1.4.0.redhat-630254.war
:subsystem_undertow_xml_urn: urn:jboss:domain:undertow:4.0
:saml_adapter_xsd_urn: http://www.keycloak.org/schema/keycloak_saml_adapter_1_9.xsd
:saml_adapter_xsd_urn: https://www.keycloak.org/schema/keycloak_saml_adapter_1_9.xsd

View file

@ -87,4 +87,4 @@
:fuseHawtioWARVersion: hawtio-wildfly-1.4.0.redhat-630254.war
:subsystem_undertow_xml_urn: urn:jboss:domain:undertow:4.0
:saml_adapter_xsd_urn: http://www.keycloak.org/schema/keycloak_saml_adapter_1_9.xsd
:saml_adapter_xsd_urn: https://www.keycloak.org/schema/keycloak_saml_adapter_1_9.xsd